Search Our Catalog 
 About the Library 
 Library Card Account 
 E-Books & Audiobooks 
 Didn't Find? 
   
BasicAdvancedNumberWhat CirculatesSearch History
Search:    Refine Search 
> You're searching: New Jersey State Library
 
 Search Results
 1341 titles matched: computer security
Sort by: 
   Limit by:  
PrevNext
 This library owns a copy means this library owns a copy

 31.
Building Linux and OpenBSD firewalls / Wes Sonnenreich, Tom Yates. This library owns a copy
by Sonnenreich, Wes, 1974-
New York : John Wiley & Sons, 1999.
Call #: 005.8 Son
Add to my list
collection: General Collection - Level 1
Format: book
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
LocationCollectionCall No.StatusDue Date
New Jersey State LibraryGeneral Collection - Level 1005.8 SonChecked In 
 
 Add to my list  

 32.
E-policy : how to develop computer, E-mail, and Internet guidelines to protect your company and its assets / Michael R. Overly. This library owns a copy
by Overly, Michael R.
New York : AMACOM, c1999.
Call #: 658.478 Ove
Add to my list
collection: General Collection - Level 1
Format: book
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
LocationCollectionCall No.StatusDue Date
New Jersey State LibraryGeneral Collection - Level 1658.478 OveChecked In 
 
 Add to my list  

 33.
Virtual private networks for dummies / by Mark Merkow. This library owns a copy
by Merkow, Mark S.
Foster City, CA : IDG Books Worldwide, c1999.
Call #: 658.478 Mer
Add to my list
collection: General Collection - Level 1
Format: book
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
LocationCollectionCall No.StatusDue Date
New Jersey State LibraryGeneral Collection - Level 1658.478 MerChecked In 
 
 Add to my list  

 34.
Database nation : the death of privacy in the 21st century / Simon Garfinkel. This library owns a copy
by Garfinkel, Simson.
Beijing ; Cambridge : O'Reilly, c2000.
Call #: 323.448 Gar
Add to my list
collection: General Collection - Level 1
Format: book
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
LocationCollectionCall No.StatusDue Date
New Jersey State LibraryGeneral Collection - Level 1323.448 GarChecked In 
 
 Add to my list  

 35.
Practices for securing critical information assets. This library owns a copy
Add to my list
Washington, D.C. (1800 G Street, N.W., Suite 8-130, Washington) : Critical Infrastructure Assurance Office, [2000]
Call #: PR42.8: IN3/C86/2
Add to my list
collection: US Documents - Ask Librarian
Format: book
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
LocationCollectionCall No.StatusDue Date
New Jersey State LibraryUS Documents - Ask LibrarianPR42.8: IN3/C86/2Checked In 
 
 Add to my list  

 36.
Guide for developing security plans for information technology systems [microform] / Marianne Swanson and Federal Computer Security Program Managers' Forum Working Group. This library owns a copy
by Swanson, Marianne.
Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.
Call #: C13.10: 800-18
Add to my list
collection: US Documents - M/form - Level 4
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
LocationCollectionCall No.StatusDue Date
New Jersey State LibraryUS Documents - M/form - Level 4C13.10: 800-18Non Circulating 
 
 Add to my list  

 37.
Guideline for implementing cryptography in the federal government [microform] / Annabelle Lee. This library owns a copy
by Lee, Annabelle.
Gaithersburg, MD : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology ; Washington, DC : For sale by the Supt. of Docs., U.S. G.P.O., [1999]
Call #: C13.10: 800-21
Add to my list
collection: US Documents - M/form - Level 4
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
LocationCollectionCall No.StatusDue Date
New Jersey State LibraryUS Documents - M/form - Level 4C13.10: 800-21Non Circulating 
 
 Add to my list  

 38.
Computer viruses : a high-tech disease / Ralf Burger. This library owns a copy
by Burger, R. (Ralf)
Grand Rapids, Mich. : Abacus, 1989, c1988.
Call #: 005.8 Bur
Add to my list
collection: General Collection - Level 1
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
LocationCollectionCall No.StatusDue Date
New Jersey State LibraryGeneral Collection - Level 1005.8 BurChecked In 
 
 Add to my list  

 39.
CyberShock : surviving hackers, phreakers, identity thieves, Internet terrorists, and weapons of mass disruption / by Winn Schwartau. This library owns a copy
by Schwartau, Winn.
New York : Thunder's Mouth Press, 2000.
Call #: 005.8 Sch
Add to my list
collection: General Collection - Level 1
Format: book
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
LocationCollectionCall No.StatusDue Date
New Jersey State LibraryGeneral Collection - Level 1005.8 SchChecked In 
 
 Add to my list  

 40.
Best truth : intelligence and security in the Information Age / Bruce D. Berkowitz and Allan E. Goodman. This library owns a copy
by Berkowitz, Bruce D., 1956-
New Haven : Yale University Press, c2000.
Call #: 005.8 Ber
Add to my list
collection: General Collection - Level 1
Format: book
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
Add to my list
LocationCollectionCall No.StatusDue Date
New Jersey State LibraryGeneral Collection - Level 1005.8 BerChecked In 
 
 Add to my list  

 This library owns a copy means this library owns a copy Prev12345678910Next>>
Add/Remove MyList (max=100, ie. 1,2 5-20) 

Format:HTMLPlain textDelimitedMLAChicago
Email items: (max=100, ie. 1,2 5-20) 
Subject: 
Email to:

Horizon Information Portal 3.25_9382
 Powered by SirsiDynix
© 2001-2013 SirsiDynix All rights reserved.
Horizon Information Portal